CN105849757B - 用于监控第三方对受限制物品的访问的系统和方法 - Google Patents
用于监控第三方对受限制物品的访问的系统和方法 Download PDFInfo
- Publication number
- CN105849757B CN105849757B CN201480071065.3A CN201480071065A CN105849757B CN 105849757 B CN105849757 B CN 105849757B CN 201480071065 A CN201480071065 A CN 201480071065A CN 105849757 B CN105849757 B CN 105849757B
- Authority
- CN
- China
- Prior art keywords
- key data
- article
- restricted article
- restricted
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000012544 monitoring process Methods 0.000 title claims abstract description 42
- 230000000750 progressive effect Effects 0.000 claims description 24
- 238000003780 insertion Methods 0.000 claims description 17
- 230000037431 insertion Effects 0.000 claims description 17
- 238000005516 engineering process Methods 0.000 claims description 16
- 238000013475 authorization Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 7
- 238000004088 simulation Methods 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims description 2
- 230000001052 transient effect Effects 0.000 claims 2
- 238000007726 management method Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 108090000623 proteins and genes Proteins 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 2
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 2
- 239000010931 gold Substances 0.000 description 2
- 229910052737 gold Inorganic materials 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000000840 anti-viral effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009182 swimming Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0208—Trade or exchange of goods or services in exchange for incentives or rewards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0226—Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0254—Targeted advertisements based on statistics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- General Engineering & Computer Science (AREA)
- Probability & Statistics with Applications (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA201308093 | 2013-10-25 | ||
ZA2013/08093 | 2013-10-25 | ||
ZA201400928 | 2014-02-07 | ||
ZA2014/00928 | 2014-02-07 | ||
PCT/IB2014/065586 WO2015059669A1 (fr) | 2013-10-25 | 2014-10-24 | Système et procédé de contrôle d'accès tiers à un élément restreint |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105849757A CN105849757A (zh) | 2016-08-10 |
CN105849757B true CN105849757B (zh) | 2019-09-03 |
Family
ID=51796477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201480071065.3A Active CN105849757B (zh) | 2013-10-25 | 2014-10-24 | 用于监控第三方对受限制物品的访问的系统和方法 |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP3061057A1 (fr) |
CN (1) | CN105849757B (fr) |
GB (1) | GB2514716A (fr) |
RU (1) | RU2656995C2 (fr) |
WO (1) | WO2015059669A1 (fr) |
ZA (1) | ZA201603571B (fr) |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11282139B1 (en) | 2013-06-28 | 2022-03-22 | Gemini Ip, Llc | Systems, methods, and program products for verifying digital assets held in a custodial digital asset wallet |
US10269009B1 (en) | 2013-06-28 | 2019-04-23 | Winklevoss Ip, Llc | Systems, methods, and program products for a digital math-based asset exchange |
US10354325B1 (en) | 2013-06-28 | 2019-07-16 | Winklevoss Ip, Llc | Computer-generated graphical user interface |
US9898782B1 (en) | 2013-06-28 | 2018-02-20 | Winklevoss Ip, Llc | Systems, methods, and program products for operating exchange traded products holding digital math-based assets |
US10068228B1 (en) | 2013-06-28 | 2018-09-04 | Winklevoss Ip, Llc | Systems and methods for storing digital math-based assets using a secure portal |
WO2016105265A1 (fr) * | 2014-12-22 | 2016-06-30 | Cryex Group Ab | Procédés, appareil et systèmes permettant un règlement de transactions d'actifs cryptographiques |
US9853977B1 (en) | 2015-01-26 | 2017-12-26 | Winklevoss Ip, Llc | System, method, and program product for processing secure transactions within a cloud computing system |
CA2975528C (fr) | 2015-02-09 | 2024-01-30 | T0.Com, Inc. | Plate-forme d'integration de chiffrement |
US10915891B1 (en) | 2015-03-16 | 2021-02-09 | Winklevoss Ip, Llc | Autonomous devices |
US10158480B1 (en) | 2015-03-16 | 2018-12-18 | Winklevoss Ip, Llc | Autonomous devices |
WO2016161073A1 (fr) | 2015-03-31 | 2016-10-06 | Nasdaq, Inc. | Systèmes et procédés d'enregistrement de transactions de chaîne de blocs |
US11704733B2 (en) | 2015-05-01 | 2023-07-18 | Tzero Ip, Llc | Crypto multiple security asset creation and redemption platform |
US9870562B2 (en) | 2015-05-21 | 2018-01-16 | Mastercard International Incorporated | Method and system for integration of market exchange and issuer processing for blockchain-based transactions |
US10552829B2 (en) | 2015-05-26 | 2020-02-04 | tZERO Group, Inc. | Obfuscation of intent in transactions using cryptographic techniques |
EP3317775B1 (fr) | 2015-07-02 | 2022-02-16 | Nasdaq, Inc. | Systèmes et procédés de provenance sécurisée pour des bases de données de transactions distribuées |
US11436598B2 (en) | 2017-12-15 | 2022-09-06 | Fmr Llc | Social data tracking datastructures, apparatuses, methods and systems |
US10992469B2 (en) | 2015-07-14 | 2021-04-27 | Fmr Llc | Seed splitting and firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems |
US10778439B2 (en) | 2015-07-14 | 2020-09-15 | Fmr Llc | Seed splitting and firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems |
US10644885B2 (en) | 2015-07-14 | 2020-05-05 | Fmr Llc | Firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems |
US11488147B2 (en) | 2015-07-14 | 2022-11-01 | Fmr Llc | Computationally efficient transfer processing and auditing apparatuses, methods and systems |
US11636471B2 (en) | 2017-12-15 | 2023-04-25 | Fmr Llc | Social data tracking datastructures, apparatuses, methods and systems |
US10504179B1 (en) | 2015-12-08 | 2019-12-10 | Fmr Llc | Social aggregated fractional equity transaction partitioned acquisition apparatuses, methods and systems |
US10339523B2 (en) | 2015-07-14 | 2019-07-02 | Fmr Llc | Point-to-point transaction guidance apparatuses, methods and systems |
GB2540976A (en) * | 2015-07-31 | 2017-02-08 | British Telecomm | Access control |
US10108812B2 (en) | 2016-01-28 | 2018-10-23 | Nasdaq, Inc. | Systems and methods for securing and disseminating time sensitive information using a blockchain |
EP3411824B1 (fr) | 2016-02-04 | 2019-10-30 | Nasdaq Technology AB | Systèmes et procédés de stockage et de partage de données transactionnelles utilisant des systèmes informatiques distribués |
CN107145768B (zh) * | 2016-03-01 | 2021-02-12 | 华为技术有限公司 | 版权管理方法和系统 |
WO2017187399A1 (fr) | 2016-04-29 | 2017-11-02 | nChain Holdings Limited | Mise en œuvre d'une fonctionnalité de grille logique à l'aide d'une chaîne de blocs |
CN107967416B (zh) | 2016-10-19 | 2021-07-09 | 华为技术有限公司 | 版权维权检测的方法、装置和系统 |
CN109976969A (zh) * | 2017-12-27 | 2019-07-05 | 航天信息股份有限公司 | 一种电子发票信息的监控方法、装置、设备及介质 |
US11909860B1 (en) | 2018-02-12 | 2024-02-20 | Gemini Ip, Llc | Systems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain |
US11200569B1 (en) | 2018-02-12 | 2021-12-14 | Winklevoss Ip, Llc | System, method and program product for making payments using fiat-backed digital assets |
US11139955B1 (en) | 2018-02-12 | 2021-10-05 | Winklevoss Ip, Llc | Systems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain |
US10438290B1 (en) | 2018-03-05 | 2019-10-08 | Winklevoss Ip, Llc | System, method and program product for generating and utilizing stable value digital assets |
US10540654B1 (en) | 2018-02-12 | 2020-01-21 | Winklevoss Ip, Llc | System, method and program product for generating and utilizing stable value digital assets |
US10373158B1 (en) | 2018-02-12 | 2019-08-06 | Winklevoss Ip, Llc | System, method and program product for modifying a supply of stable value digital asset tokens |
US11308487B1 (en) | 2018-02-12 | 2022-04-19 | Gemini Ip, Llc | System, method and program product for obtaining digital assets |
US11475442B1 (en) | 2018-02-12 | 2022-10-18 | Gemini Ip, Llc | System, method and program product for modifying a supply of stable value digital asset tokens |
US11522700B1 (en) | 2018-02-12 | 2022-12-06 | Gemini Ip, Llc | Systems, methods, and program products for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain |
US10373129B1 (en) | 2018-03-05 | 2019-08-06 | Winklevoss Ip, Llc | System, method and program product for generating and utilizing stable value digital assets |
US10929842B1 (en) | 2018-03-05 | 2021-02-23 | Winklevoss Ip, Llc | System, method and program product for depositing and withdrawing stable value digital assets in exchange for fiat |
US11334883B1 (en) | 2018-03-05 | 2022-05-17 | Gemini Ip, Llc | Systems, methods, and program products for modifying the supply, depositing, holding and/or distributing collateral as a stable value token in the form of digital assets |
WO2019200431A1 (fr) * | 2018-04-19 | 2019-10-24 | Decentralised Illiteracy Organisation Pty Ltd | Système de paiement |
CN111428172A (zh) * | 2019-01-10 | 2020-07-17 | 嘉太科技(北京)有限公司 | 一种文字作品在互联网传播中的管理方法、装置及平台 |
CN111510421B (zh) * | 2019-01-31 | 2022-09-16 | 金联汇通信息技术有限公司 | 数据处理方法、装置、电子设备和计算机可读存储介质 |
US12093942B1 (en) | 2019-02-22 | 2024-09-17 | Gemini Ip, Llc | Systems, methods, and program products for modifying the supply, depositing, holding, and/or distributing collateral as a stable value token in the form of digital assets |
US11501370B1 (en) | 2019-06-17 | 2022-11-15 | Gemini Ip, Llc | Systems, methods, and program products for non-custodial trading of digital assets on a digital asset exchange |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101196975A (zh) * | 2006-12-04 | 2008-06-11 | 创联网股份有限公司 | 利用嵌入式浮水印保护数字数据的方法 |
CN101960446A (zh) * | 2008-03-02 | 2011-01-26 | 雅虎公司 | 基于安全浏览器的应用 |
CN102246455A (zh) * | 2008-12-11 | 2011-11-16 | 三菱电机株式会社 | 自我认证通信设备以及设备认证系统 |
CN102342052A (zh) * | 2009-01-28 | 2012-02-01 | 海德沃特合作I有限公司 | 用于设备辅助的服务的安全技术 |
WO2012162739A1 (fr) * | 2011-05-31 | 2012-12-06 | Piratec Pty Ltd | Système et procédé de distribution multimédia cryptée |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
US7426750B2 (en) * | 2000-02-18 | 2008-09-16 | Verimatrix, Inc. | Network-based content distribution system |
US20040005078A1 (en) * | 2002-06-21 | 2004-01-08 | Spectra Systems Corporation | Method and apparatus for digitally watermarking images created with a mobile imaging device |
US7908477B2 (en) * | 2004-07-27 | 2011-03-15 | Seiji Eto | System and method for enabling device dependent rights protection |
US20080215889A1 (en) * | 2005-10-13 | 2008-09-04 | Koninklijke Philips Electronics, N.V. | Efficient Watermark Detection |
JP5605810B2 (ja) * | 2007-10-05 | 2014-10-15 | ディジマーク コーポレイション | マスタコピーの透かし特性を変化させることを含めてコンテンツの特性を変化させることによるコンテンツのシリアル化 |
US20090271319A1 (en) * | 2008-04-29 | 2009-10-29 | Microsoft Corporation | Embedded Licenses for Content |
US20090316950A1 (en) * | 2008-06-23 | 2009-12-24 | Alasia Alfred V | Object Authentication Using a Programmable Image Acquisition Device |
WO2012168799A2 (fr) * | 2011-05-19 | 2012-12-13 | Zoran Konevic | Systèmes, procédés et appareil de distribution d'échantillons de produit |
US9818109B2 (en) * | 2012-08-16 | 2017-11-14 | Danny Loh | User generated autonomous digital token system |
-
2014
- 2014-09-10 GB GB1416002.2A patent/GB2514716A/en not_active Withdrawn
- 2014-10-24 EP EP14806725.9A patent/EP3061057A1/fr not_active Ceased
- 2014-10-24 RU RU2016119148A patent/RU2656995C2/ru not_active IP Right Cessation
- 2014-10-24 CN CN201480071065.3A patent/CN105849757B/zh active Active
- 2014-10-24 WO PCT/IB2014/065586 patent/WO2015059669A1/fr active Application Filing
-
2016
- 2016-05-25 ZA ZA2016/03571A patent/ZA201603571B/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101196975A (zh) * | 2006-12-04 | 2008-06-11 | 创联网股份有限公司 | 利用嵌入式浮水印保护数字数据的方法 |
CN101960446A (zh) * | 2008-03-02 | 2011-01-26 | 雅虎公司 | 基于安全浏览器的应用 |
CN102246455A (zh) * | 2008-12-11 | 2011-11-16 | 三菱电机株式会社 | 自我认证通信设备以及设备认证系统 |
CN102342052A (zh) * | 2009-01-28 | 2012-02-01 | 海德沃特合作I有限公司 | 用于设备辅助的服务的安全技术 |
WO2012162739A1 (fr) * | 2011-05-31 | 2012-12-06 | Piratec Pty Ltd | Système et procédé de distribution multimédia cryptée |
Also Published As
Publication number | Publication date |
---|---|
GB2514716A (en) | 2014-12-03 |
ZA201603571B (en) | 2017-11-29 |
RU2656995C2 (ru) | 2018-06-07 |
GB201416002D0 (en) | 2014-10-22 |
EP3061057A1 (fr) | 2016-08-31 |
CN105849757A (zh) | 2016-08-10 |
RU2016119148A (ru) | 2017-12-01 |
WO2015059669A1 (fr) | 2015-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105849757B (zh) | 用于监控第三方对受限制物品的访问的系统和方法 | |
US20230214792A1 (en) | Computer implemented systems and methods | |
US9595034B2 (en) | System and method for monitoring third party access to a restricted item | |
US20230004970A1 (en) | Distributed Ledgers with Ledger Entries Containing Redactable Payloads | |
US20230086191A1 (en) | Systems and Methods for Token Content Unlocking, Biometric Authentication using Privacy-Protecting Tokens, Ownership-Based Limitations of Content Access, Policy-Based Time Capsule Technology, and Content Lock Mechanisms | |
CN110178338A (zh) | 活动门票的数字证券化、模糊化、策略和商务 | |
Ivancsics | Blockchain in journalism | |
EP4388405A1 (fr) | Systèmes et procédés d'établissement de rapport d'interactions de jetons | |
Sung | Prospects and challenges posed by blockchain technology on the copyright legal system | |
Aldweesh | The impact of blockchain on digital content distribution: a systematic review | |
Hutchison | Acceptance of electronic monetary exchanges, specifically bitcoin, by information security professionals: A quantitative study using the unified theory of acceptance and use of technology (UTAUT) model | |
Schoenhals et al. | Overview of licensing platforms based on distributed ledger technology | |
Lee et al. | Internal Audit and the BLOCKCHAIN: There's more to blockchain than bitcoin, and auditors have much to learn about how it works. | |
Porras | Intellectual Property and the Blockchain Sector, a World of Potential Economic Growth and Conflict | |
Djajadi et al. | Blockchain-Based E-Certificate Verification and Validation Automation Architecture to Avoid Counterfeiting of Digital Assets in Order to Accelerate Digital Transformation | |
Rose | GDPR challenges for blockchain technology | |
Ramani et al. | Blockchain for digital rights management | |
Nirolia | A study on the application of blockchain technology in the banking and financial sector in India | |
Duong | Blockchain applications in agriculture: Revolutionizing the food supply chain | |
Katkova et al. | Provision of cybersecurity in Ukraine: Issues of legal responsibility | |
US20230325792A1 (en) | Method and a system to decrease deforestation and clearcutting by issuing a green crypto utility token adding a new layer of non-fungible digital value | |
Jadhav et al. | Online Certificate Generation and Verification Using Blockchain Framework | |
Alex et al. | Blockchain technology–scope of legal regulations | |
Wronka | Crypto-asset regulatory landscape: a comparative analysis of the crypto-asset regulation in the UK and Germany | |
Catanzaro | Fixing ReDigi: NFT Tethered Sound Recordings |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190325 Address after: Stallenbos, West Cape, South Africa Applicant after: CMT Research Private Limited Address before: Western Cape Applicant before: Stellenbosch University |
|
GR01 | Patent grant | ||
GR01 | Patent grant |